Cyber Crossword

123456789101112131415161718
Across
  1. 4. Software designed to harm or exploit computer systems.
  2. 9. Deceptive attempts to acquire sensitive information via email.
  3. 10. (4,3)Exploits unknown vulnerabilities, posing a high risk.
  4. 13. (6,11)Manipulating individuals to divulge confidential information.
  5. 14. (5,3) Ethical hackers who use their skills to help organisations improve security.
  6. 15. The boundary or border of a network, often protected by firewalls.
  7. 16. Unauthorised access or breach into system.
  8. 17. Protects data by converting it into a secret code.
  9. 18. (3,6)Enhanced security requiring authentication through two distinct methods.
Down
  1. 1. Weaknesses in a system that can be exploited.
  2. 2. (8,8) A structured approach to address and manage the aftermath of a cyber incident.
  3. 3. Updating software to fix vulnerabilities and improve security.
  4. 5. The point at which a device connects to a network, vulnerable to cyber threats.
  5. 6. Malicious software that encrypts files and demands payment for their release.
  6. 7. Verifying the identity of a user.
  7. 8. A secret word or code needed to gain access.
  8. 11. Acts as a barrier to prevent unauthorised access.
  9. 12. Authentication based on unique physical or behavioural characteristics.